On Computing the Fuzzy Weighted Average Using the KM Algorithms

Size: px
Start display at page:

Download "On Computing the Fuzzy Weighted Average Using the KM Algorithms"

Transcription

1 O Computig the Fuzzy Weighted Average Usig the KM Algorithms Feilog iu ad Jerry M Medel Sigal ad Image Processig Istitute, Departmet of Electrical Egieerig Uiversity of Souther Califoria, 3740 McClitock Ave, os Ageles, CA feilog@uscedu/medel@sipiuscedu Abstract By coectig the fuzzy weighted average (FWA ad the geeralized cetroid (GC of a iterval type-2 fuzzy set we have arrived at a ew α- cut algorithm for solvig the FWA problem, oe that is mootoically ad super-expoetially coverget Our ew algorithm uses the Karik-Medel (KM algorithms to compute the FWA α-cut ed-poits No faster algorithm for solvig this problem exists to-date Keywords: Fuzzy weighted average, cetroid, KM algorithms, iterval type-2 fuzzy set 1 Itroductio The fuzzy weighted average (FWA, which is a weighted average ivolvig type-1 fuzzy sets, as explaied mathematically below, is useful as a aggregatio (fusio metho situatios where decisios ( x i ad expert weights ( are modeled as type-1 fuzzy sets, or where the decisios are modeled as either crisp umbers or iterval sets, ad the expert weights are still modeled as type-1 fuzzy sets Sometimes the same or similar problem is solve differet settigs This is a paper about such a situatio, amely computig the FWA, which is a problem that has bee studie multiple criteria decisio makig ([1]-[4], [7], [8], ad computig the geeralized cetroid of a iterval type-2 fuzzy set (herei referred to as the geeralized cetroid GC, which is a problem that has bee studie rule-based iterval type-2 fuzzy logic systems ([5], [9], [10] Here we demostrate how very sigificat computatioal advatages are obtaied for solvig the FWA problem by usig the GC algorithms developed by Karik ad Medel 1 To begi, cosider the followig weighted average: y =! x i! = f (w 1,,w, x 1,, x (1 I (1, are weights that act upo attributes x i Normalizatio is achieved by dividig the weighted umerator sum by the sum of all of the weights Without ormalizatio, too much emphasis would be placed o oe attribute over aother It is the ormalizatio that makes the calculatio of y very challegig i the FWA I (1 we are itereste the case whe some or!x i are type-1 (T1 fuzzy umbers, ie each x i is described by the membership fuctio (MF of a T1 fuzzy set (FS, µ Xi (x i, where this MF must be pre-specified, ad some or! are also T1 fuzzy umbers, ie each is described by the MF of a T1 FS, µ Wi (, where this MF must also be pre-specified y is a T1 FS, Y FWA with MF µ YFWA (y, but there is o kow closedform formula for computig µ YFWA (y! " cuts, a! " cut Decompositio Theorem [6] of a T1 1 These algorithms are ofte referred to i the T2 FS literature as the KM algorithms We shall also refer to them i this way

2 FS, ad a variety of algorithms ([1]-[4], [7], [8] ca be used to compute µ YFWA (y 2 Previous Approaches Begiig i 1987, various solutios to compute µ YFWA (y have bee proposed Dog ad Wog [1] were apparetly the first to develop a method for computig the FWA Although their algorithm is based o! " cuts ad a! " cut Decompositio Theorem [6], it is very computatioally iefficiet, because it uses a exhaustive-search iou ad Wag [8] did some importat aalyses that led to a improved algorithm (IFWA that drastically reduced the computatioal complexity of Dog ad Wog s algorithm They were the first to observe that (for each! " cut sice the x i appear oly i the umerator of (1, oly the smallest values of the x i are used to fid the smallest value of (1, ad oly the largest values of the x i are used to fid the largest value of (1 (Karik ad Medel [5], who were uaware oiou ad Wag s work, based their algorithms o the same observatios ee ad Park [7] preseted a efficiet FWA algorithm (EFWA that built o the observatios oiou ad Wag The total computatioal complexities of the three algorithms for m! " cuts are: FWA- O(m2 2, IFWA- O(m 2, ad EFWA- O(2m l These are ot the oly methods that have bee published Other methods are i [2]-[4] Except for [2], all of these methods are based o! " cuts ad a! " cut Decompositio Theorem Of the existig algorithms that use! " cuts, the EFWA represets the most computatioally efficiet oe to compute the FWA 3 The KM Algorithms for Computig the FWA As i the previous! " cut based methods, we begi by discretizig the complete rage of the membership [0, 1] of the fuzzy umbers ito m α-cuts,! 1,,! m, where the degree of accuracy depeds o the umber of α-cuts, ie m The, for each! j, we fid the correspodig itervals for X i i x i ad W i i, the ed-poits of which are [a i,b i ] ad [, ], respectively ( i = 1,, compute ( j = 1,, m where = f U = As i [7], [8], we Y FWA = " # f, f R % (2 mi " #[, ] max " #[, ] a i b i (3 (4 after which we defie the idicator fuctio + I! j (y = 1 "y # % f, f R & ' Y FWA (5 0 "y ( % f, f R &,+ ' from which we ca the costruct µ YFWA (y, as µ YFWA (y = sup " j I " j (y (6 Y!" j ( j=1,,m FWA What distiguishes our approach from earlier approaches are the ways i which we compute ad f R We have recogized that ad f R are precisely the same calculatios as eede the computatio of the GC of a iterval T2 FS [5], [9] i (3 ad f U i (4 ca be computed as (for otatioal coveiece we do ot show the explicit depedece of quatities o! j : = f U = mi! "[, ] max! "[, ] # a i # # b i # = = k # a i + a i k # + # i=k +1 # i=k +1 k U# b i + b i k U# + # i=k U +1 # i=k U +1 (7 (8 where switch poits k U ad k are computed usig the KM algorithms, which are stated ext Because of space limitatios, we caot provide derivatios (our joural versio of this paper will iclude them

3 31 KM Algorithm for k U ad f U 0 Rearragemet for the f U calculatios: I (1, x i are replaced by the b i, where b i are arrage ascedig order, ie b 1 < b 2 <! < b Associate the respective with its (possibly re-labeled b i I the remaiig steps we shall assume that the otatio use (8 is for the re-ordered (if ecessary ad b i 1 Iitialize for i = 1,2,,, ad the compute f U! = " b i " (9 Two ways for iitializig = ( + / 2 for are: (a i = 1,2,,, ad (b =, i! ( +1 / 2 "# % ad =, i >!" ( +1 / 2#, where!" # deotes the first iteger equal to or smaller tha 2 Fid k (1 k 1 such that b k! f U " < b k+1 3 Set = for i! k ad = for i! k +1, ad compute f U!!(b k " f U!!(k = k # b i + # b i k i=k+1 # + # i=k+1 (10 4 Check if f U!!(k = f U! If yes, the stop f U!!(k is the maximum value of! b i! which equals f U, ad k equals the switch poit k U If o, go to Step 5 5 Set f U! equal to f U!!(k ad go to Step 2 32 KM algorithm for k ad 0 Rearragemet for the calculatios: I (1, x i are replaced by the a i, where a i are arrage ascedig order, ie a 1 < a 2 <! < a Associate the respective with its (possibly re-labeled a i I the remaiig steps we shall assume that the otatio use (7 is for the re-ordered (if ecessary ad a i 1 Iitialize (i either of the two ways listed after (9 for i = 1,2,,, ad the compute! = " a i " (11 2 Fid k (1 k 1 such that a k! " < a k+1 3 Set = for i! k ad = for i! k +1, ad compute!!(a k "!!(k = k # a i + # a i k i=k+1 # + # i=k+1 (12 4 Check if!!(k =! If yes, the stop!!(k is the miimum value of a! i! w i ad equals f, ad k equals the switch poit k If o, go to Step 5 5 Set! equal to!!(k ad go to Step 2 4 Iterpretatio of the KM Algorithms We state three properties for!!(k so that the KM algorithm ca be provided with a graphical iterpretatio for its computatio Similar properties exist for f U!!(k It is assumed that a i have bee sorte icreasig order so that a 1! a 2!!! a Additioally, recall that the miimum of!!(k occurs at k = k ; hece, f =!!(k k is ccalled the switch poit for the miimum calculatio Property 1 (ocatio of the miimum: Whe k = k, the a k! ""(k < a k +1 where!! (k is computed by settig k = k i (12, ad mi ( f!! (k = f!! (k = f k=1,, This property locates the miimum by fidig the miimum of!!(k, k = 1,,, eg i Fig 1, the miimum of!!(k (k = 1,, is!!(4, so that k = 4 Observe that a 4! ""(4 < a 5, which locates the miimum

4 Property 2 (ocatio of!!(k i relatio to the lie y = a k :!!(k lies above the lie y = a k whe a k is to the left of, ad lies below the lie y = a k whe a k is to the right of, ie!!(k > a " #% k, whe a k < " &% < a k, whe a k > (13 This property provides iterestig relatios betwee a k ad!!(k o both sides of the miimum f, eg i Fig 1!!(k lies above a k to the left of f! " ##(4, at lies below a k to the right of f! " ##(4 This property does ot imply!!(k mootoic o either side of ; but, it does demostrate that!!(k caot be above the lie y = a k to the right of Property 3 is about the mootoicity of!!(k It will show, eg that!!(k is mootoically o-decreasig to the right of f ; but, this could occur i two very differet ways, amely,!!(k could be above the lie y = a k or below that lie to the right of Property 2 rules out the former Property 3 (Mootoicity of!!(k : It is true that!!(k "1 #!!(k whe a k < %!!(k +1 #!!(k whe a k > &' (14 This property shows that!!(k is a mootoic fuctio (but ot a strictly-mootoic fuctio o both sides of the miimum of the FWA For example, i Fig 1!!(k mootoically decreases to the left of f! " ##(4, whereas, it mootoically icreases to the right of f! " ##(4 Fig 1 provides a graphical iterpretatio of the KM algorithm that computes f The large dots are plots of!!(k for k = 1,,9 ; ote that k is associated with the subscript of a k The 45- degree lie y = a k is show because of the is computatios i Step 2 of the KM algorithm! has bee chose accordig to Method (b that is stated below (9 Because = 9,!" ( +1 / 2# = 5, which is why! is located at a 5 After! has bee computed, the a horizotal lie is draw util it itersects y = a k By virtue of Step 2 of the algorithm, we see that a 4! " < a 5, ad we the slide dow the 45- degree lie y = a k util we reach a 4, at which poit!!(4 is computed This is the vertical lie from a 4 that itersects a large dot Because!!(4 "!, the algorithm the goes through aother complete iteratio before it stops, at which time!!(4 has bee determied to be For this example, the KM algorithm coverges i two iteratios 5 Properties of the KM Algorithms Recetly, Medel ad iu [10] have prove that: 1 The KM algorithms are mootoically coverget 2 The KM algorithms are superexpoetially coverget et j deote a iteratio couter ( j = 1,2, A formula for j as a fuctio of prescribed bits of accuracy,!, is derive [10] Because we use this formula i Sectio 7 to support our simulatios, we state it ext for A comparable formula exists for f U et!(0 deote the first value of! as give i (11, ad, 2! " f ##(1 f #(0 f % 1 (15 Super-expoetial covergece 3 of the KM algorithm occurs to withi! bits of accuracy whe 2! " 1 follows from the mootoic covergece of the KM algorithms 3 Why this is super-expoetial covergece rather tha covergece is explaied fully i [10] It is evideced by the appearace of! 2 j i (17, the amplitude of whose logarithm is ot liear but is cocave upwards, which is idicative of a superexpoetial covergece factor

5 !!( j "!!( j "1 # (16 which, as prove i [10], is satisfied by the first iteger j! " 2 for which:!! 2 j "! 2( j"1 # %(0 " f (17 I geeral, this equatio has o closed form solutio for j; however, for small values of!, we ca drop the term! 2 j (which is much smaller tha the term! 2( j"1, ad solve for j! as: j! = 1+ 1 l 2 " l, 1 l# " l & # 0 - ( '(!(0 % f + 1 / 2 = 1+ 1, 1 " l 1+ l 2 l# " l & 0 - ( '(!(0 % f + 1 / 2 (18 j! = first iteger larger tha j " (19 We haste to poit out that the use of (18 ad (19 requires kowig the aswer as well as!!(1 The latter is oly available after the first iteratio of the KM algorithm; hece, the a priori use of these equatios is limited However, these equatios ca be used after-thefact (as we do i Sectio 7 to cofirm the very rapid covergece of the KM algorithms We have observed from may simulatios that for two sigificat figures of accuracy, the covergece of the KM algorithms occurs i 2-6 iteratios 6 EFWA Algorithms I Sectio 7 we compare covergece results for the KM algorithms with the EFWA algorithms Based o our derivatio of the KM algorithms, it is relatively easy to uderstad the followig: 61 EFWA Algorithm for f U 0 Rearragemet for the f U calculatios: Same as Step 0 i the KM Algorithm 1 Iitialize first = 1 ad last = 2 et k =!" 1 2 ( first + last # ad compute f U!!(k i (10 3 If b k! f U ""(k < b k+1, stop ad set f U = f U!!(k ad k = k U ; otherwise, go to Step 4 4 If f U!!(k " b k, set first = k + 1 ; otherwise, set last = k Go to Step 2 62 EFWA Algorithm for 0 Rearragemet for the calculatios: Same as Step 0 i the KM Algorithm 1 Iitialize first = 1 ad last = 2 et k =!" 1 2 ( first + last # ad compute!!(k i (12 3 If a k! f ""(k < a k+1, stop ad set f =!!(k ; otherwise, go to Step 4 4 If!!(k " a k, set first = k + 1 ; otherwise, set last = k Go to Step 2 Fig 2 provides a graphical iterpretatio of the EFWA algorithm that computes the same f as i Fig 1 As i Fig 1, the large dots are plots of!!(k for k = 1,,9 The 45-degree lie y = a k is show because of the computatios i Step 3 of the EFWA algorithm Sice = 9,!" ( +1 / 2# = 5, so that k = 5, which is why!!(5 has bee located at a 5 For this value of!!(5 we fail the test i Step 3 [ie,!!(5 is ot betwee a 5 ad a 6 ] ad as a result of Step 4 [ie,!!(5 < a 5 ] we set last = 5 Returig to Step 2, we fid k = 3 ad the compute!!(3, which is why there is a lie with a arrow o it from!!(5 to!!(a 3 =!!(3 For this value of!!(3 we agai fail the test i Step 3 [ie,!!(3 is ot betwee a 3 ad a 4 ] ad as a result of Step 4 [ie,!!(3 > a 3 ] we set first = 4 Returig to Step 2, we fid k = 4 ad the compute!!(4, which is why there is a arrow o it from!!(3 to!!(a 4 =!!(4 For this value of!!(4 we pass the test i Step 3 [ie,!!(4 is betwee a 4 ad a 5 ], stop ad set f =!!(4 This example, which is the same oe as i Fig 1, has take the EFWA three iteratios to coverge whereas it took the KM algorithm two iteratios to coverge, 7 Experimetal Results I this sectio we preset simulatio results i which we compare the covergece umbers for the KM ad EFWA algorithms Because, for each! " cut, both algorithms cosist of two

6 parts, oe for computig f U ad oe for computig, ad each part is essetially the same, we oly performed our simulatio study for computig There are may ways i which algorithm compariso experimets could be desiged, ad we do ot claim to have examied all of them I our simulatios we focused o radom desigs i which for a fixed value of (the umber of terms i the FWA ad! we chose each a i ( i = 1, 2,, ad the iterval ed-poits for each ( ad, i = 1, 2,, radomly accordig to a prescribed distributio We did this for = 2, 4, 6,, 200 ad for uiform, expoetial, Gaussia, Chi-squared, ad ocetral T-distributios The three radom sequeces a i, ad were geerated usig the same distributio but with differet seed umbers, ad for all the distributios a i![0,10],![0,1] ad![0,1] The a i were the sorted i icreasig order, ad the correspodig ad always satisfied the requiremets that! 0,! 0 ad! For each value of ad each distributio, 100 Mote-Carlo simulatios were performed ad the umbers of iteratios for both the KM ad EFWA to coverge to were recorded We the computed the mea ad stadard deviatio of the covergece umbers Because the results from these experimets looked very similar regardless of a specific distributio, we oly show our results here for the uiform distributio Parameters a i, ad were geerated by Matlab fuctio rad( usig differet seeds, respectively All a i values were scaled by 10, so that!a i "[0,10] Our results are summarize Fig 3 Note that covergece umber refers to the umber of iteratios it takes for a algorithm to STOP Note, also, that the curve labeled KM epsilo is for the KM algorithm that uses the approximate stoppig rule (16 for which we have chose! = 001 This stoppig rule is differet from the exact stoppig rule that is give i Step 4 of the KM algorithm Observe that: 1 The mea covergece umber for the KM algorithm is approximately two, at is "# (l!1% for the EFWA algorithm, where!" # deotes the first iteger equal to or larger tha The stadard deviatio of the covergece umber for the KM algorithm is approximately 05, at is approximately 12 for the EFWA algorithm 2 Accordig to cetral limit theory, the distributio of covergece umbers (for each is approximately ormal with mea ad stadard deviatio equal to the sample mea ad stadard deviatio sho Fig 2 We ca therefore use the sample mea + two times the sample stadard deviatio to evaluate the covergece umbers with 975% cofidece 4 Cosequetly we are 975% cofidet that the KM algorithm coverges i approximately three iteratios, ad that the EFWA algorithm coverges i approximately!" (l + 14# iteratios We see, therefore, that the KM algorithm is computatioally more efficiet tha the EFWA algorithm 3 Whe! 3, the KM algorithm eeds a smaller umber of iteratios tha does the EFWA algorithm Whe! 2, both algorithms eed the same umber of iteratios 4 The KM epsilo covergece umbers depicte Fig 3 agree with those obtaied from (18 ad (19, eg for = 200, we observed from ruig the KM algorithm that!(0 = 44077,!!(1 = , ad = 43783, so (! " %& ##(1 ' ( #(0 = ad l! = "61706 For! = 001, l{! /[ "(0 # f ]} = #10784, so that ( l 2 j = 1+ l 1+ l{! /[ "(0 # f ]} / l ( l 2 = 1+ l 1+ [#10784 #61706 = Because iteratios must be positive, this is a oesided cofidece iterval

7 Hece, j! = 2 which equals the true mea covergece umber of k = 2 8 Coclusios By coectig solutios from two differet problems the fuzzy weighted average (FWA ad the geeralized cetroid (GC of a iterval type-2 fuzzy set we have arrived at a ew α- cut algorithm for solvig the FWA problem, oe that coverges mootoically ad superexpoetially fast Our simulatios demostrate that for each α-cut, covergece occurs (to withi a 975% cofidece iterval i three iteratios No faster α-cut algorithm for solvig this problem exists to-date If 2m parallel processors are available, we ca use the ew KM α-cut algorithms to compute the FWA i three iteratios (to withi 975% cofidece, because the calculatios of f ad f U are totally idepedet, ad all m α-cut calculatios are also idepedet Research is uderway to exted the FWA from type-1 fuzzy sets to iterval type-2 fuzzy sets, somethig we call the fuzzy-fuzzy weighted average (FFWA [12] The FWA plays a major role i computig the FFWA We also believe that the FWA ca be used to perform typereductio for a geeral type-2 fuzzy set, somethig that we are also studyig Refereces [1] W M Dog ad F S Wog, Fuzzy weighted averages amplemetatio of the extesio priciple, Fuzzy Sets ad Systems, vol 21, pp , 1987 [2] D Dubois, H Fargier ad J Forti, A geeralized vertex method for computig with fuzzy itervals, Proc FUZZ IEEE 2004, Budapest, Hugary, pp , 2004 [3] Y-Y Guh, C-C Ho ad E S ee, Fuzzy weighted average: the liear programmig approach via Chares ad Cooper s rule, Fuzzy Sets ad Systems, vol 117, pp , 2001 [4] Y-Y Guh, C-C Ho, K-M Wag ad E S ee, Fuzzy weighted average: a maxmi paired elimiatio method, Computers Math Applic, vol 32, pp , 1996 [5] N N Karik ad J M Medel, Cetroid of a type-2 fuzzy set, Iformatio Scieces, vol 132, pp , 2001 [6] G J Klir ad B Yua, Fuzzy Sets ad Fuzzy ogic: Theory ad Applicatios, Pretice- Hall, Upper Saddle River, NJ, 1995 [7] D H ee ad D Park, A efficiet algorithm for fuzzy weighted average, Fuzzy Sets ad Systems, vol 87, pp 39-45, 1997 [8] T-S iou ad M-J J Wag, Fuzzy weighted average: a improved algorithm, Fuzzy Sets ad Systems, vol 49, pp , 1992 [9] J M Medel, Ucertai Rule-Based Fuzzy ogic Systems: Itroductio ad New Directios, Pretice-Hall, Upper Saddle River, NJ, 2001 [10] J M Medel ad F iu, Superexpoetial covergece of the Karik- Medel algorithms for computig the cetroid of a iterval type-2 fuzzy set, accepted for publicatio i IEEE Tras o Fuzzy Systems, 2005 [11] J M Medel, Fuzzy sets for words: a ew begiig, Proc of IEEE It l Cof o Fuzzy Systems, St ouis, MO, pp 37-42, May 2003 [12] D Wu ad J M Medel, The fuzzy-fuzzy weighted average (FFWA, to be submitted, 2005

8 (a Figure 1: A graphical iterpretatio of the KM algorithm that computes The solid lie show for y = a k oly has values at a 1,a 2,,a 9 (b Fig 3: (a Mea ad (b stadard deviatio of the covergece umbers whe parameters are uiformly distributed Fig 2: A graphical iterpretatio of the EFWA algorithm that computes The solid lie show for y = a k oly has values at a 1,a 2,,a 9

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

LU Decomposition Method

LU Decomposition Method SOLUTION OF SIMULTANEOUS LINEAR EQUATIONS LU Decompositio Method Jamie Traha, Autar Kaw, Kevi Marti Uiversity of South Florida Uited States of America kaw@eg.usf.edu http://umericalmethods.eg.usf.edu Itroductio

More information

The golden search method: Question 1

The golden search method: Question 1 1. Golde Sectio Search for the Mode of a Fuctio The golde search method: Questio 1 Suppose the last pair of poits at which we have a fuctio evaluatio is x(), y(). The accordig to the method, If f(x())

More information

UNIT 4 Section 8 Estimating Population Parameters using Confidence Intervals

UNIT 4 Section 8 Estimating Population Parameters using Confidence Intervals UNIT 4 Sectio 8 Estimatig Populatio Parameters usig Cofidece Itervals To make ifereces about a populatio that caot be surveyed etirely, sample statistics ca be take from a SRS of the populatio ad used

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

( n+1 2 ) , position=(7+1)/2 =4,(median is observation #4) Median=10lb

( n+1 2 ) , position=(7+1)/2 =4,(median is observation #4) Median=10lb Chapter 3 Descriptive Measures Measures of Ceter (Cetral Tedecy) These measures will tell us where is the ceter of our data or where most typical value of a data set lies Mode the value that occurs most

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

Solving Fuzzy Assignment Problem Using Fourier Elimination Method

Solving Fuzzy Assignment Problem Using Fourier Elimination Method Global Joural of Pure ad Applied Mathematics. ISSN 0973-768 Volume 3, Number 2 (207), pp. 453-462 Research Idia Publicatios http://www.ripublicatio.com Solvig Fuzzy Assigmet Problem Usig Fourier Elimiatio

More information

ENGI 4421 Probability and Statistics Faculty of Engineering and Applied Science Problem Set 1 Descriptive Statistics

ENGI 4421 Probability and Statistics Faculty of Engineering and Applied Science Problem Set 1 Descriptive Statistics ENGI 44 Probability ad Statistics Faculty of Egieerig ad Applied Sciece Problem Set Descriptive Statistics. If, i the set of values {,, 3, 4, 5, 6, 7 } a error causes the value 5 to be replaced by 50,

More information

Lower Bounds for Sorting

Lower Bounds for Sorting Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

Fast Fourier Transform (FFT) Algorithms

Fast Fourier Transform (FFT) Algorithms Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform

More information

Data Structures and Algorithms. Analysis of Algorithms

Data Structures and Algorithms. Analysis of Algorithms Data Structures ad Algorithms Aalysis of Algorithms Outlie Ruig time Pseudo-code Big-oh otatio Big-theta otatio Big-omega otatio Asymptotic algorithm aalysis Aalysis of Algorithms Iput Algorithm Output

More information

EM375 STATISTICS AND MEASUREMENT UNCERTAINTY LEAST SQUARES LINEAR REGRESSION ANALYSIS

EM375 STATISTICS AND MEASUREMENT UNCERTAINTY LEAST SQUARES LINEAR REGRESSION ANALYSIS EM375 STATISTICS AND MEASUREMENT UNCERTAINTY LEAST SQUARES LINEAR REGRESSION ANALYSIS I this uit of the course we ivestigate fittig a straight lie to measured (x, y) data pairs. The equatio we wat to fit

More information

Cubic Polynomial Curves with a Shape Parameter

Cubic Polynomial Curves with a Shape Parameter roceedigs of the th WSEAS Iteratioal Coferece o Robotics Cotrol ad Maufacturig Techology Hagzhou Chia April -8 00 (pp5-70) Cubic olyomial Curves with a Shape arameter MO GUOLIANG ZHAO YANAN Iformatio ad

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana The Closest Lie to a Data Set i the Plae David Gurey Southeaster Louisiaa Uiversity Hammod, Louisiaa ABSTRACT This paper looks at three differet measures of distace betwee a lie ad a data set i the plae:

More information

1.2 Binomial Coefficients and Subsets

1.2 Binomial Coefficients and Subsets 1.2. BINOMIAL COEFFICIENTS AND SUBSETS 13 1.2 Biomial Coefficiets ad Subsets 1.2-1 The loop below is part of a program to determie the umber of triagles formed by poits i the plae. for i =1 to for j =

More information

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured

More information

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem Exact Miimum Lower Boud Algorithm for Travelig Salesma Problem Mohamed Eleiche GeoTiba Systems mohamed.eleiche@gmail.com Abstract The miimum-travel-cost algorithm is a dyamic programmig algorithm to compute

More information

Perhaps the method will give that for every e > U f() > p - 3/+e There is o o-trivial upper boud for f() ad ot eve f() < Z - e. seems to be kow, where

Perhaps the method will give that for every e > U f() > p - 3/+e There is o o-trivial upper boud for f() ad ot eve f() < Z - e. seems to be kow, where ON MAXIMUM CHORDAL SUBGRAPH * Paul Erdos Mathematical Istitute of the Hugaria Academy of Scieces ad Reu Laskar Clemso Uiversity 1. Let G() deote a udirected graph, with vertices ad V(G) deote the vertex

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

CHAPTER IV: GRAPH THEORY. Section 1: Introduction to Graphs

CHAPTER IV: GRAPH THEORY. Section 1: Introduction to Graphs CHAPTER IV: GRAPH THEORY Sectio : Itroductio to Graphs Sice this class is called Number-Theoretic ad Discrete Structures, it would be a crime to oly focus o umber theory regardless how woderful those topics

More information

The number n of subintervals times the length h of subintervals gives length of interval (b-a).

The number n of subintervals times the length h of subintervals gives length of interval (b-a). Simulator with MadMath Kit: Riema Sums (Teacher s pages) I your kit: 1. GeoGebra file: Ready-to-use projector sized simulator: RiemaSumMM.ggb 2. RiemaSumMM.pdf (this file) ad RiemaSumMMEd.pdf (educator's

More information

The isoperimetric problem on the hypercube

The isoperimetric problem on the hypercube The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose

More information

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects. The

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045 Oe Brookigs Drive St. Louis, Missouri 63130-4899, USA jaegerg@cse.wustl.edu

More information

The Extended Weibull Geometric Family

The Extended Weibull Geometric Family The Exteded Weibull Geometric Family Giovaa Oliveira Silva 1 Gauss M. Cordeiro 2 Edwi M. M. Ortega 3 1 Itroductio The literature o Weibull models is vast, disjoited, ad scattered across may differet jourals.

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time ( 3.1) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step- by- step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information

Analysis of Algorithms

Analysis of Algorithms Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Ruig Time Most algorithms trasform iput objects ito output objects. The

More information

Convergence results for conditional expectations

Convergence results for conditional expectations Beroulli 11(4), 2005, 737 745 Covergece results for coditioal expectatios IRENE CRIMALDI 1 ad LUCA PRATELLI 2 1 Departmet of Mathematics, Uiversity of Bologa, Piazza di Porta Sa Doato 5, 40126 Bologa,

More information

Optimal Mapped Mesh on the Circle

Optimal Mapped Mesh on the Circle Koferece ANSYS 009 Optimal Mapped Mesh o the Circle doc. Ig. Jaroslav Štigler, Ph.D. Bro Uiversity of Techology, aculty of Mechaical gieerig, ergy Istitut, Abstract: This paper brigs out some ideas ad

More information

Lecture 5. Counting Sort / Radix Sort

Lecture 5. Counting Sort / Radix Sort Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

Normal Distributions

Normal Distributions Normal Distributios Stacey Hacock Look at these three differet data sets Each histogram is overlaid with a curve : A B C A) Weights (g) of ewly bor lab rat pups B) Mea aual temperatures ( F ) i A Arbor,

More information

Creating Exact Bezier Representations of CST Shapes. David D. Marshall. California Polytechnic State University, San Luis Obispo, CA , USA

Creating Exact Bezier Representations of CST Shapes. David D. Marshall. California Polytechnic State University, San Luis Obispo, CA , USA Creatig Exact Bezier Represetatios of CST Shapes David D. Marshall Califoria Polytechic State Uiversity, Sa Luis Obispo, CA 93407-035, USA The paper presets a method of expressig CST shapes pioeered by

More information

A Note on Least-norm Solution of Global WireWarping

A Note on Least-norm Solution of Global WireWarping A Note o Least-orm Solutio of Global WireWarpig Charlie C. L. Wag Departmet of Mechaical ad Automatio Egieerig The Chiese Uiversity of Hog Kog Shati, N.T., Hog Kog E-mail: cwag@mae.cuhk.edu.hk Abstract

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations Applied Mathematical Scieces, Vol. 1, 2007, o. 25, 1203-1215 A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045, Oe

More information

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

OCR Statistics 1. Working with data. Section 3: Measures of spread

OCR Statistics 1. Working with data. Section 3: Measures of spread Notes ad Eamples OCR Statistics 1 Workig with data Sectio 3: Measures of spread Just as there are several differet measures of cetral tedec (averages), there are a variet of statistical measures of spread.

More information

BOOLEAN MATHEMATICS: GENERAL THEORY

BOOLEAN MATHEMATICS: GENERAL THEORY CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.

More information

Algorithms Chapter 3 Growth of Functions

Algorithms Chapter 3 Growth of Functions Algorithms Chapter 3 Growth of Fuctios Istructor: Chig Chi Li 林清池助理教授 chigchi.li@gmail.com Departmet of Computer Sciece ad Egieerig Natioal Taiwa Ocea Uiversity Outlie Asymptotic otatio Stadard otatios

More information

Lecture 2: Spectra of Graphs

Lecture 2: Spectra of Graphs Spectral Graph Theory ad Applicatios WS 20/202 Lecture 2: Spectra of Graphs Lecturer: Thomas Sauerwald & He Su Our goal is to use the properties of the adjacecy/laplacia matrix of graphs to first uderstad

More information

Protected points in ordered trees

Protected points in ordered trees Applied Mathematics Letters 008 56 50 www.elsevier.com/locate/aml Protected poits i ordered trees Gi-Sag Cheo a, Louis W. Shapiro b, a Departmet of Mathematics, Sugkyukwa Uiversity, Suwo 440-746, Republic

More information

BASED ON ITERATIVE ERROR-CORRECTION

BASED ON ITERATIVE ERROR-CORRECTION A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity

More information

Using a Dynamic Interval Type-2 Fuzzy Interpolation Method to Improve Modeless Robots Calibrations

Using a Dynamic Interval Type-2 Fuzzy Interpolation Method to Improve Modeless Robots Calibrations Joural of Cotrol Sciece ad Egieerig 3 (25) 9-7 doi:.7265/2328-223/25.3. D DAVID PUBLISHING Usig a Dyamic Iterval Type-2 Fuzzy Iterpolatio Method to Improve Modeless Robots Calibratios Yig Bai ad Dali Wag

More information

Consider the following population data for the state of California. Year Population

Consider the following population data for the state of California. Year Population Assigmets for Bradie Fall 2016 for Chapter 5 Assigmet sheet for Sectios 5.1, 5.3, 5.5, 5.6, 5.7, 5.8 Read Pages 341-349 Exercises for Sectio 5.1 Lagrage Iterpolatio #1, #4, #7, #13, #14 For #1 use MATLAB

More information

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only Edited: Yeh-Liag Hsu (998--; recommeded: Yeh-Liag Hsu (--9; last updated: Yeh-Liag Hsu (9--7. Note: This is the course material for ME55 Geometric modelig ad computer graphics, Yua Ze Uiversity. art of

More information

Fuzzy Minimal Solution of Dual Fully Fuzzy Matrix Equations

Fuzzy Minimal Solution of Dual Fully Fuzzy Matrix Equations Iteratioal Coferece o Applied Mathematics, Simulatio ad Modellig (AMSM 2016) Fuzzy Miimal Solutio of Dual Fully Fuzzy Matrix Equatios Dequa Shag1 ad Xiaobi Guo2,* 1 Sciece Courses eachig Departmet, Gasu

More information

Arithmetic Sequences

Arithmetic Sequences . Arithmetic Sequeces COMMON CORE Learig Stadards HSF-IF.A. HSF-BF.A.1a HSF-BF.A. HSF-LE.A. Essetial Questio How ca you use a arithmetic sequece to describe a patter? A arithmetic sequece is a ordered

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

How do we evaluate algorithms?

How do we evaluate algorithms? F2 Readig referece: chapter 2 + slides Algorithm complexity Big O ad big Ω To calculate ruig time Aalysis of recursive Algorithms Next time: Litterature: slides mostly The first Algorithm desig methods:

More information

Recursive Procedures. How can you model the relationship between consecutive terms of a sequence?

Recursive Procedures. How can you model the relationship between consecutive terms of a sequence? 6. Recursive Procedures I Sectio 6.1, you used fuctio otatio to write a explicit formula to determie the value of ay term i a Sometimes it is easier to calculate oe term i a sequece usig the previous terms.

More information

Outline and Reading. Analysis of Algorithms. Running Time. Experimental Studies. Limitations of Experiments. Theoretical Analysis

Outline and Reading. Analysis of Algorithms. Running Time. Experimental Studies. Limitations of Experiments. Theoretical Analysis Outlie ad Readig Aalysis of Algorithms Iput Algorithm Output Ruig time ( 3.) Pseudo-code ( 3.2) Coutig primitive operatios ( 3.3-3.) Asymptotic otatio ( 3.6) Asymptotic aalysis ( 3.7) Case study Aalysis

More information

ANN WHICH COVERS MLP AND RBF

ANN WHICH COVERS MLP AND RBF ANN WHICH COVERS MLP AND RBF Josef Boští, Jaromír Kual Faculty of Nuclear Scieces ad Physical Egieerig, CTU i Prague Departmet of Software Egieerig Abstract Two basic types of artificial eural etwors Multi

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

Examples and Applications of Binary Search

Examples and Applications of Binary Search Toy Gog ITEE Uiersity of Queeslad I the secod lecture last week we studied the biary search algorithm that soles the problem of determiig if a particular alue appears i a sorted list of iteger or ot. We

More information

New Results on Energy of Graphs of Small Order

New Results on Energy of Graphs of Small Order Global Joural of Pure ad Applied Mathematics. ISSN 0973-1768 Volume 13, Number 7 (2017), pp. 2837-2848 Research Idia Publicatios http://www.ripublicatio.com New Results o Eergy of Graphs of Small Order

More information

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs What are we goig to lear? CSC316-003 Data Structures Aalysis of Algorithms Computer Sciece North Carolia State Uiversity Need to say that some algorithms are better tha others Criteria for evaluatio Structure

More information

Project 2.5 Improved Euler Implementation

Project 2.5 Improved Euler Implementation Project 2.5 Improved Euler Implemetatio Figure 2.5.10 i the text lists TI-85 ad BASIC programs implemetig the improved Euler method to approximate the solutio of the iitial value problem dy dx = x+ y,

More information

Name Date Hr. ALGEBRA 1-2 SPRING FINAL MULTIPLE CHOICE REVIEW #1

Name Date Hr. ALGEBRA 1-2 SPRING FINAL MULTIPLE CHOICE REVIEW #1 Name Date Hr. ALGEBRA - SPRING FINAL MULTIPLE CHOICE REVIEW #. The high temperatures for Phoeix i October of 009 are listed below. Which measure of ceter will provide the most accurate estimatio of the

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

MATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fitting)

MATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fitting) MATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fittig) I this chapter, we will eamie some methods of aalysis ad data processig; data obtaied as a result of a give

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Octahedral Graph Scaling

Octahedral Graph Scaling Octahedral Graph Scalig Peter Russell Jauary 1, 2015 Abstract There is presetly o strog iterpretatio for the otio of -vertex graph scalig. This paper presets a ew defiitio for the term i the cotext of

More information

Counting the Number of Minimum Roman Dominating Functions of a Graph

Counting the Number of Minimum Roman Dominating Functions of a Graph Coutig the Number of Miimum Roma Domiatig Fuctios of a Graph SHI ZHENG ad KOH KHEE MENG, Natioal Uiversity of Sigapore We provide two algorithms coutig the umber of miimum Roma domiatig fuctios of a graph

More information

Numerical Methods Lecture 6 - Curve Fitting Techniques

Numerical Methods Lecture 6 - Curve Fitting Techniques Numerical Methods Lecture 6 - Curve Fittig Techiques Topics motivatio iterpolatio liear regressio higher order polyomial form expoetial form Curve fittig - motivatio For root fidig, we used a give fuctio

More information

A Study on the Performance of Cholesky-Factorization using MPI

A Study on the Performance of Cholesky-Factorization using MPI A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio

More information

Alpha Individual Solutions MAΘ National Convention 2013

Alpha Individual Solutions MAΘ National Convention 2013 Alpha Idividual Solutios MAΘ Natioal Covetio 0 Aswers:. D. A. C 4. D 5. C 6. B 7. A 8. C 9. D 0. B. B. A. D 4. C 5. A 6. C 7. B 8. A 9. A 0. C. E. B. D 4. C 5. A 6. D 7. B 8. C 9. D 0. B TB. 570 TB. 5

More information

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Higher-order iterative methods free from second derivative for solving nonlinear equations

Higher-order iterative methods free from second derivative for solving nonlinear equations Iteratioal Joural of the Phsical Scieces Vol 6(8, pp 887-89, 8 April, Available olie at http://wwwacademicjouralsorg/ijps DOI: 5897/IJPS45 ISSN 99-95 Academic Jourals Full Legth Research Paper Higher-order

More information

Computational Geometry

Computational Geometry Computatioal Geometry Chapter 4 Liear programmig Duality Smallest eclosig disk O the Ageda Liear Programmig Slides courtesy of Craig Gotsma 4. 4. Liear Programmig - Example Defie: (amout amout cosumed

More information

Mathematical Stat I: solutions of homework 1

Mathematical Stat I: solutions of homework 1 Mathematical Stat I: solutios of homework Name: Studet Id N:. Suppose we tur over cards simultaeously from two well shuffled decks of ordiary playig cards. We say we obtai a exact match o a particular

More information

Intro to Scientific Computing: Solutions

Intro to Scientific Computing: Solutions Itro to Scietific Computig: Solutios Dr. David M. Goulet. How may steps does it take to separate 3 objects ito groups of 4? We start with 5 objects ad apply 3 steps of the algorithm to reduce the pile

More information

Civil Engineering Computation

Civil Engineering Computation Civil Egieerig Computatio Fidig Roots of No-Liear Equatios March 14, 1945 World War II The R.A.F. first operatioal use of the Grad Slam bomb, Bielefeld, Germay. Cotets 2 Root basics Excel solver Newto-Raphso

More information

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8)

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8) CIS 11 Data Structures ad Algorithms with Java Fall 017 Big-Oh Notatio Tuesday, September 5 (Make-up Friday, September 8) Learig Goals Review Big-Oh ad lear big/small omega/theta otatios Practice solvig

More information

Section 7.2: Direction Fields and Euler s Methods

Section 7.2: Direction Fields and Euler s Methods Sectio 7.: Directio ields ad Euler s Methods Practice HW from Stewart Tetbook ot to had i p. 5 # -3 9-3 odd or a give differetial equatio we wat to look at was to fid its solutio. I this chapter we will

More information

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today Admiistrative Fial project No office hours today UNSUPERVISED LEARNING David Kauchak CS 451 Fall 2013 Supervised learig Usupervised learig label label 1 label 3 model/ predictor label 4 label 5 Supervised

More information

Performance Plus Software Parameter Definitions

Performance Plus Software Parameter Definitions Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios

More information

On (K t e)-saturated Graphs

On (K t e)-saturated Graphs Noame mauscript No. (will be iserted by the editor O (K t e-saturated Graphs Jessica Fuller Roald J. Gould the date of receipt ad acceptace should be iserted later Abstract Give a graph H, we say a graph

More information

Improved Random Graph Isomorphism

Improved Random Graph Isomorphism Improved Radom Graph Isomorphism Tomek Czajka Gopal Paduraga Abstract Caoical labelig of a graph cosists of assigig a uique label to each vertex such that the labels are ivariat uder isomorphism. Such

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

Assignment Problems with fuzzy costs using Ones Assignment Method

Assignment Problems with fuzzy costs using Ones Assignment Method IOSR Joural of Mathematics (IOSR-JM) e-issn: 8-8, p-issn: 9-6. Volume, Issue Ver. V (Sep. - Oct.06), PP 8-89 www.iosrjourals.org Assigmet Problems with fuzzy costs usig Oes Assigmet Method S.Vimala, S.Krisha

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

Lecture 1: Introduction and Strassen s Algorithm

Lecture 1: Introduction and Strassen s Algorithm 5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access

More information

1.8 What Comes Next? What Comes Later?

1.8 What Comes Next? What Comes Later? 35 1.8 What Comes Next? What Comes Later? A Practice Uderstadig Task For each of the followig tables, CC BY Hiroaki Maeda https://flic.kr/p/6r8odk describe how to fid the ext term i the sequece, write

More information

AN OPTIMIZATION NETWORK FOR MATRIX INVERSION

AN OPTIMIZATION NETWORK FOR MATRIX INVERSION 397 AN OPTIMIZATION NETWORK FOR MATRIX INVERSION Ju-Seog Jag, S~ Youg Lee, ad Sag-Yug Shi Korea Advaced Istitute of Sciece ad Techology, P.O. Box 150, Cheogryag, Seoul, Korea ABSTRACT Iverse matrix calculatio

More information

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence _9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to

More information

NTH, GEOMETRIC, AND TELESCOPING TEST

NTH, GEOMETRIC, AND TELESCOPING TEST NTH, GEOMETRIC, AND TELESCOPING TEST Sectio 9. Calculus BC AP/Dual, Revised 08 viet.dag@humbleisd.et /4/08 0:0 PM 9.: th, Geometric, ad Telescopig Test SUMMARY OF TESTS FOR SERIES Lookig at the first few

More information

Evaluation of Fuzzy Quantities by Distance Method and its Application in Environmental Maps

Evaluation of Fuzzy Quantities by Distance Method and its Application in Environmental Maps Joural of pplied Sciece ad griculture, 8(3): 94-99, 23 ISSN 86-92 Evaluatio of Fuzzy Quatities by Distace Method ad its pplicatio i Evirometal Maps Saeifard ad L Talebi Departmet of pplied Mathematics,

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

CSC165H1 Worksheet: Tutorial 8 Algorithm analysis (SOLUTIONS)

CSC165H1 Worksheet: Tutorial 8 Algorithm analysis (SOLUTIONS) CSC165H1, Witer 018 Learig Objectives By the ed of this worksheet, you will: Aalyse the ruig time of fuctios cotaiig ested loops. 1. Nested loop variatios. Each of the followig fuctios takes as iput a

More information

Intermediate Statistics

Intermediate Statistics Gait Learig Guides Itermediate Statistics Data processig & display, Cetral tedecy Author: Raghu M.D. STATISTICS DATA PROCESSING AND DISPLAY Statistics is the study of data or umerical facts of differet

More information

Parabolic Path to a Best Best-Fit Line:

Parabolic Path to a Best Best-Fit Line: Studet Activity : Fidig the Least Squares Regressio Lie By Explorig the Relatioship betwee Slope ad Residuals Objective: How does oe determie a best best-fit lie for a set of data? Eyeballig it may be

More information

Polynomial Functions and Models. Learning Objectives. Polynomials. P (x) = a n x n + a n 1 x n a 1 x + a 0, a n 0

Polynomial Functions and Models. Learning Objectives. Polynomials. P (x) = a n x n + a n 1 x n a 1 x + a 0, a n 0 Polyomial Fuctios ad Models 1 Learig Objectives 1. Idetify polyomial fuctios ad their degree 2. Graph polyomial fuctios usig trasformatios 3. Idetify the real zeros of a polyomial fuctio ad their multiplicity

More information

Computer Science Foundation Exam. August 12, Computer Science. Section 1A. No Calculators! KEY. Solutions and Grading Criteria.

Computer Science Foundation Exam. August 12, Computer Science. Section 1A. No Calculators! KEY. Solutions and Grading Criteria. Computer Sciece Foudatio Exam August, 005 Computer Sciece Sectio A No Calculators! Name: SSN: KEY Solutios ad Gradig Criteria Score: 50 I this sectio of the exam, there are four (4) problems. You must

More information

New Fuzzy Color Clustering Algorithm Based on hsl Similarity

New Fuzzy Color Clustering Algorithm Based on hsl Similarity IFSA-EUSFLAT 009 New Fuzzy Color Clusterig Algorithm Based o hsl Similarity Vasile Ptracu Departmet of Iformatics Techology Tarom Compay Bucharest Romaia Email: patrascu.v@gmail.com Abstract I this paper

More information